Copyright 2005 John Wiley & Sons, Inc7 - 1 Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons, Inc Prof. M. Ulema Manhattan College Computer Information Systems
Copyright 2005 John Wiley & Sons, Inc7 - 2 Chapter 7 Wireless Local Area Networks
Copyright 2005 John Wiley & Sons, Inc7 - 3 Outline Introduction IEEE b IEEE a IEEE g Bluetooth Best practice WLAN Design Improving WLAN Performance
Copyright 2005 John Wiley & Sons, Inc7 - 4 Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables) Basic Categories –Use of Radio frequencies (FOCUS of this chapter) 802.1x family of standards (aka, Wi-Fi) –Use of Infrared frequencies (Optical transmission) Wi-Fi grown in popularity –Eliminates cabling –Facilitates network access from a variety of locations Airports, cafes, restaurants, etc., –Facilitates for mobile workers (as in a hospital)
Copyright 2005 John Wiley & Sons, Inc7 - 5 Principal WLANs Technologies IEEE b –Standardization started after.11a, but finished before IEEE a –First attempt to standardization of WLANs; more complicated than.11b IEEE g Bluetooth –Also an IEEE standard
Copyright 2005 John Wiley & Sons, Inc7 - 6 IEEE b Reuses many Ethernet components Designed to connect easily to Ethernet –a.ka., wireless Ethernet Also called Wi-Fi –Marketing ploy; sounds like Hi-Fi Versions of.11b –Direct Sequence Spread Spectrum (DSSS) Focus of this chapter (more popular) –Frequency Hopping Spread Spectrum (FHSS)
Copyright 2005 John Wiley & Sons, Inc7 - 7 Versions of IEEE b Direct Sequence Spread Spectrum (DSSS) –Uses the entire frequency band to transmit information –Capable of data rates of up to 11 Mbps –Fallback rates: 5.5, 2 and 1 Mbps. (Used when interference or congestion occurs) –Dominates market place, because faster Frequency Hopping Spread Spectrum (FHSS) –Divides the frequency band into a series of channels Then changes its frequency channel about every half a second, based on a pseudorandom sequence More secure, –Only capable of data rates of 1 or 2 Mbps
Copyright 2005 John Wiley & Sons, Inc7 - 8 WLAN Topology A wireless Access Point (AP) connected into an Ethernet Switch Same as Ethernet Physical star Logical bus Use the same radio frequencies, so take turns using the network Uses a NIC that transmits radio signals to the AP 10Base-T or 100Base-T
Copyright 2005 John Wiley & Sons, Inc7 - 9 Components of WLANs Network Interface Cards –Available for laptops as PCMCIA cards –Available for desktops as standard cards –Many laptops come with WLAN cards built in –About feet max transmission range Access Points (APs) –Used instead of hubs; act as a repeater Must hear all computers in WLAN –Message transmitted twice »Sender to AP, then AP to receiver
Copyright 2005 John Wiley & Sons, Inc More on the APs and NICs 3 separate channels available for b –All devices using an AP must use the same channel WLAN functions as a shared media LAN –Reduces the interference –Users can roam from AP to AP Initially NIC selects a channel (thus an AP) –Based on “strength of signal” from an AP During roaming, if NIC sees another AP with a stronger signal, attaches itself to this AP Usually a set of APs installed to provide geographical coverage and meet traffic needs –NICs selects a less busy channel if its current channel becomes busy (too many users)
Copyright 2005 John Wiley & Sons, Inc Antennas used in WLANs Omni directional antennas –Transmit in all directions simultaneously –Used on most WLANs Dipole antenna (rubber duck) –Transmits in all direction (vertical, horizontal, up, down) Directional antennas –Project signal only in one direction Focused area; stronger signal; farther ranges –Most often used on inside of an exterior wall To reduce the security issue –A potential problem with WLANs Figures 7.2 and 7.3 will be used here
Copyright 2005 John Wiley & Sons, Inc WLAN Media Access Control Uses CSMA/CA –CA collision avoidance –A station waits until another station is finished transmitting plus an additional random period of time before sending anything May use two MAC techniques simultaneously –Distributed Coordination Function (DCF) Also called “Physical Carrier Sense Method” –Point Coordination Function (PCF) Also called “Virtual Carrier Sense Method” Optional: (can be set as “always”, “never”, or “just for certain frame sizes”
Copyright 2005 John Wiley & Sons, Inc Distributed Coordination Function Relies on the ability of computers to physically listen before they transmit –When a node wants to send a message: First listens to make sure that the transmitting node has finished, then Waits a period of time longer Each frame is sent using stop-and-wait ARQ –By waiting, the listening node can detect that the sending node has finished and –Can then begin sending its transmission –ACK/NAK sent a short time after a frame is received, –Message frames are sent a somewhat longer time after (ensuring that no collision will occur)
Copyright 2005 John Wiley & Sons, Inc Point Coordination Function (PCF) Solves Hidden Node problem –Two computers can not detect each other’s signals A computer is near the transmission limits of the AP at one end and another computer is near the transmission limits at the other end of the AP’s range –Physical carrier sense method will not work Solution –First send a Request To Send (RTS) signal to the AP Request to reserve the circuit and duration –AP responds with a Clear To Send (CTS) signal, Also indicates duration that the channel is reserved –Computer wishing to send begins transmitting
Copyright 2005 John Wiley & Sons, Inc Message Delineation >>>>>> Figure 7.4 goes here
Copyright 2005 John Wiley & Sons, Inc Preamble of b Packets Used to mark the start of the packet Always transmitted at 1 Mbps Sub fields of Preamble –Long preamble version 16 sync bytes of alternating 1’s and 0’s 1 byte of start of frame delimiter ( ) –Short preamble version 7 sync bytes 1 byte of start of frame
Copyright 2005 John Wiley & Sons, Inc Physical Layer Convergence Protocol (PLCP) Used to indicate data rates and packet length Transmitted at 1 Mbps (long preamble) or at 2 Mbps (short preamble) Fields of PLCP –Signal rate (1 byte) Which of the four speeds to be used –Service field (1 byte) Reserved for future use –Length field (2 bytes) Length of the payload in 8-bit bytes –Header error check field (2 bytes) CRC-16 (if any error found, packet is discarded)
Copyright 2005 John Wiley & Sons, Inc Fields of Payload Header Frame control (2 bytes) –Indicates version of the b protocol –Contains any ACK/NAK and RTS/CTS signals Destination address (6 bytes) –AP-NIC: Address of NIC; NIC-AP-NIC: Address of AP Address 3 (6 bytes) –NIC-AP-NIC: Address of the NIC Source address (6 bytes) –AP-NIC: Address of AP; NIC-AP-NIC: Address of NIC Sequence control (2 bytes) –Contains packet number for error control Address 4 (6 bytes) –Used only for NIC-NIC communications
Copyright 2005 John Wiley & Sons, Inc Other Fields Logical Link Control Protocol Data Unit (LLC PDU) –Same as in Ethernet Physical trailer –4-byte CRC-32 used in Ethernet
Copyright 2005 John Wiley & Sons, Inc Data Transmission in PL Via radio waves –Analog medium –Digital computer data transmitted using analog transmission (Translations done by NIC and AP) Frequency and bandwidth (range of frequencies) – – GHz 83.5 MHz bandwidth in USA Transmission –83.5 MHz divided into 3 channels 22 MHz each (with 3 MHz guard bands between channels) –Data capacity of the circuit: Number of bits sent on each symbol x symbol rate Max symbol rate: depends on bandwidth and SNR –22 MHz 22 million symbols/second (perfect conditions)
Copyright 2005 John Wiley & Sons, Inc Bit Transmission in DSSS Each bit converted into a special code –8-bit or 11-bit code (designed to reduce interference) –Called spreading a bit into many bits across spectrum 1-Mbps DSS –Uses an 11-bit Barker sequence code Transmitted using binary phase shift keying (BPSK) (1 bit per symbol) 11 Mbps signaling rate 1 Mbps data rate 2-Mbps DSS –Uses the same 11-bit code Transmits using Quadrature phase shift keying (QPSK) (2 bits per symbol) 11 Mbps signaling rate 2 Mbps data rate
Copyright 2005 John Wiley & Sons, Inc Mbps DSSS with Barker code >>>>>> Figure 7.5 goes here
Copyright 2005 John Wiley & Sons, Inc IEEE a Operates in a 5 GHz frequency range Total bandwidth is 300 MHz –Faster data rates possible: Up to 54 Mbps 6, 9, 12, 18, 24, 36, 48, and 54 Mbps Uses the same topology as.11b Reduced range because of higher speed –50 meters ( 150 feet) –Highest speed achievable within 15 meter
Copyright 2005 John Wiley & Sons, Inc IEEE a Coverage Provides 4-12 channels (depending on configuration) –Important for coverage; takes more.11a AP to cover the same area (small range) –Make it possible to locate many APs in the same area to increase capacity Figure 7.6 goes here
Copyright 2005 John Wiley & Sons, Inc a Media Access Control Same as.11b Similar packet format –Preamble and PLCP Header: transmitted at 6 Mbps –PLCP parity bit field: used for error checking of header –PLCP tail field: used as a pad to “byte” align the packet –Payload service field: to sync circuitry in NIC and AP
Copyright 2005 John Wiley & Sons, Inc a Packet Layout >>>>>> Figure 7.7 goes here
Copyright 2005 John Wiley & Sons, Inc a Data Transmission Similar to b; spreads its transmission over a wider spectrum Each of 12 channel’s bandwidth = 20 MHz –Broken into 52 separate channels: KHz each, plus guard bands 48 channels for data (sent across all channels in parallel using Orthogonal Frequency Division Multiplexing (OFDM) 4 channels for control
Copyright 2005 John Wiley & Sons, Inc OFDM Versions 6-Mbps version of.11a –Groups data into sets of 24 data bits –Converts each group into an OFDM symbol of 48 bits Pattern chosen enables some error correction –Transmit each symbol in one of 48 sub channels using BPSK sent at 250 KHz 24 data bits x 250 KHz 6 Mbps 9-Mbps version –Groups data into sets of 36 bits –Transmits each symbol using BPSK 36 data bits x 250 KHz 9 Mbps
Copyright 2005 John Wiley & Sons, Inc OFDM Versions (Cont.) 12-Mbps version –Groups data into sets of 48 bits –Transmit OFDM symbol using QPSK (2 bits per symbol) 48 bits x 250 KHz x 2 bits 12 Mbps 18-Mbps version –Groups data into sets of 72 bits; uses QPSK 72 bits x 250 KHz x 2 bits 18 Mbps 24-Mbps version –Groups data into sets of 96 bits –Transmit OFDM symbol using QAM (4 bits per symbol) 96 bits x 250 KHz x 4 bits 24 Mbps
Copyright 2005 John Wiley & Sons, Inc OFDM Versions (Cont.) 36-Mbps version –Groups data into sets of 128 bits; uses QAM –Transmit OFDM symbol using QPSK (2 bits per symbol) 128 bits x 250 KHz x 4 bits 36 Mbps 48-Mbps version –Groups data into sets of 192 bits –Transmit OFDM symbol using 64-QAM (6 bits per symbol) 192 bits x 250 KHz x 6 bits 48 Mbps 54-Mbps version –Groups data into sets of 216 bits; uses 64-QAM 216 bits x 250 KHz x 6 bits 54 Mbps
Copyright 2005 John Wiley & Sons, Inc OFDM Versions (Cont.) >>>>>Fig 7.8 goes here
Copyright 2005 John Wiley & Sons, Inc IEEE g Designed to combine advantages of a and b –Offers higher data rates (up to 54 Mbps) in 2.4 GHz band (as in.11b) with longer ranges –Backward compatible with b.11b devices can interoperate with.11g APs Price to pay: when an.11g AP detects an.11b device, it prohibits.11g devices from operating at higher speeds Uses the same topology as.11b –Provides 3-6 channels (depending on configuration) –54 Mbps rate obtained within 50 meter range
Copyright 2005 John Wiley & Sons, Inc g Media Access Control Almost the same media and error control protocols as.11b –Similar packet layout, except Preambles and headers transmitted at slower speeds (up to a maximum of 11 Mbps) Payload transmitted at higher speeds (up to a max of 54 Mbps) Data Transmission in the Physical Layer –Same techniques in.11a and.11b Uses PSK, QPSK, and CCK to provide.11b rates Uses BPSK, QPSK, and QAM to provide.11a rates
Copyright 2005 John Wiley & Sons, Inc g Media Access Control Almost the same media and error control protocols as.11b –Similar packet layout, except Preambles and headers transmitted at slower speeds (up to a maximum of 11 Mbps) Payload transmitted at higher speeds (up to a max of 54 Mbps) Data Transmission in the Physical Layer –Same techniques in.11a and.11b Uses PSK, QPSK, and CCK to provide.11b rates Uses BPSK, QPSK, and QAM to provide.11a rates
Copyright 2005 John Wiley & Sons, Inc Bluetooth (IEEE ) A standard for Wireless Personal Area Network (WPAN) –Provides networking in a very small area Up to 10 meters (current generation) Up to 100 meters (next generation) –Includes small (1/3 of an inch square) and cheap devices designed to Replace short distance cabling between devices –Keyboards, mouse, handsets, PDAs, etc –Provides a basic data rate of 1 Mbps Can be divided into several voice and data channels –Uses Frequency Shift Keying (FSK) for data transmission (1 bit per symbol)
Copyright 2005 John Wiley & Sons, Inc Bluetooth Topology Uses the term “piconet” to refer to a Bluetooth network –Consists of 8 devices A “master” device controlling other devices, “slaves” –Acts like an AP –Selects frequencies and controls access –All devices in a piconet share the same frequency range
Copyright 2005 John Wiley & Sons, Inc Bluetooth Media Access Control Uses Frequency Hopping Spread Spectrum (FHSS) –Available frequency range ( ) divided into 79 separate 1-MHz channels –A data burst transmitted using one channel, next data burst uses the next channel, and so on. –Channels changed based on a sequence and established by the slave and the master prior to the data transfers 1,600 channel change per second –Also used to minimize interference A noisy channel avoided eventually Not compatible with b –Potential interference problems (especially if many Bluetooth devices present close to.11b devices)
Copyright 2005 John Wiley & Sons, Inc Bluetooth Packet Formats >>>Figure7.9 goes here
Copyright 2005 John Wiley & Sons, Inc Bluetooth Packet Fields/ Subfields Access Code: to sync the sender and receiver –Preamble: Alternating 1’s and 0’s –Sync Bytes: bit patterns based on addresses and packet types –Trailer: Alternating 1’s and 0’s Header: for address and error control –Address: Slave’s address –Type: Payload’s type (e.g., data, control etc.) –Flow Control: 1 means continue, 0 means to stop –ARQ ACK/NAK: 1 means ACK, 0 means NACK –Sequence Number: packet number used for ARQ –Header Error Check: CRC-8 for the header
Copyright 2005 John Wiley & Sons, Inc Bluetooth Packet Fields/Subfields Payload Header –Logical Channel: whether the payload has a data or control frame –Flow Control: same as before (for a another software) –Length: Payload’s length in bytes –Future Use: Reserved Payload: –Format depends on the type of data transmitted Payload trailer –CRC-16 error check code
Copyright 2005 John Wiley & Sons, Inc Infrared Wireless LAN – Require line of sight (LOS) to work (less flexible) – Main advantage: reduced wiring usually mounted in fixed positions to ensure they will hit their targets New version: diffuse infrared, –Operates without a direct LOS by bouncing the infrared signal off of walls –Only able to operate within a single room and at distances of only about feet
Copyright 2005 John Wiley & Sons, Inc Effective Data Rates in WLANs Maximum speed in bits the hardware layers can provide –Depends on Nominal data rate, Error rate, Efficiency of data link layer protocol, and Efficiency of MAC protocol Error plays a greater role in WLANs –Significant impact of interference on performance Causes frequent retransmissions, thus lower data rates
Copyright 2005 John Wiley & Sons, Inc Data Link Protocol Efficiency Factors involved: –Typical WLAN overhead: 51-bytes (with a short preamble) – Packet size: Data packets: assume a 1500-byte for full length Control packets: ACK/NAK packets –Transmission rates: Overhead bits transmission speeds Payload transmission speeds Assuming a mix of short and full length packets –85% average efficiency for b –75% average efficiency for a and g
Copyright 2005 John Wiley & Sons, Inc MAC Protocol Efficiency Uses a controlled approach (PCF) –Imposes more fixed delays initially when traffic is low Due to PCF’s permission based procedures –Allows response time delays increases slowly up to % of capacity –>>>>>>>>Figure 7.11 goes here
Copyright 2005 John Wiley & Sons, Inc Effective Rate for a Computer* b –85% efficiency x 85% capacity x 11 Mbps = 9.6 Mbps 2 users: 9.6 Mbps / 2 4.8 Mbps per user 10 users: 9.6 Mbps/10 960 Kbps per user a –75% efficiency x 85% capacity x 54 Mbps = 34.4 Mbps 2 users: 34.4 Mbps / 2 17.2 Mbps per user 10 users: 34.4 Mbps/10 3.4 Mbps per user g –75% efficiency x 85% capacity x 54 Mbps = 34.4 Mbps 2 users: 34.4 Mbps / 2 17.2 Mbps per user 10 users: 34.4 Mbps/10 3.4 Mbps per user * Under perfect conditions
Copyright 2005 John Wiley & Sons, Inc Effective Rate Estimates –Figure 7-12 goes here
Copyright 2005 John Wiley & Sons, Inc Costs b –Decreasing cost of NICs and AP s a and g –Newer technologies, higher costs Comparison with wired Ethernets –(cost of.11b AP) = (cost of 10/100Base-T switch) –(cost of.11b NIC) = $20 + (cost of 10/100Base-T NIC) –No cost for cabling and its deployment in WLAN Wired Ethernet cable deployment cost: $50 - $400 –Cheapest to install during construction of building –For new buildings Wired LANs are less expensive –Do not forget the need for mobility !!
Copyright 2005 John Wiley & Sons, Inc Best Practice Recommendations Adopt g –Will replace b and.11a –Prices of.11g NICs and APs coming down Wireless vs. Wired –802.11g ~ 10Base-T Similar data rates for low traffic environment When mobility important g Using WLAN as overlay network (over wired LAN) –WLANs installed In addition to wired LANs –To provide mobility for laptops, etc., –To provide access in hallways, lunch rooms, etc.,
Copyright 2005 John Wiley & Sons, Inc Physical WLAN Design More challenging than designing a traditional LAN –Placement of APs: Locations chosen to: Provide coverage Minimize potential interference Begins with a site survey to determine –Feasibility of desired coverage Measuring the signal strength from temporary APs –Potential sources of interference Most common source: Number and type of walls –Locations of wired LAN and power sources –Estimate of number of APs required –
Copyright 2005 John Wiley & Sons, Inc Physical WLAN Design Begin locating APs –Place an AP in one corner –Move around measuring the signal strength –Place another AP to the farthest point of coverage AP may be moved around to find best possible spot Also depends on environment and type of antenna –Repeat these steps several times until the corners are covered –Then begin the empty coverage areas in the middle Allow about 15% overlap in coverage between APs –To provide smooth and transparent roaming Set each AP to transmit on a different channel
Copyright 2005 John Wiley & Sons, Inc Physical WLAN Design Figure 7.13 goes here
Copyright 2005 John Wiley & Sons, Inc Multistory WLAN Design Must include –Usual horizontal mapping, and –Vertical mapping to minimize interference from APs on different floors Figure 7.14 goes here
Copyright 2005 John Wiley & Sons, Inc WLAN Security Especially important for wireless network –Anyone within the range can use the WLAN Finding a WLAN –Move around with WLAN equipped device and try to pick up the signal –Use special purpose software tools to learn about WLAN you discovered Wardriving – this type reconnaissance Warchalking – writing symbols on walls to indicate presence of an unsecure WLAN
Copyright 2005 John Wiley & Sons, Inc Types of WLAN Security Service Set Identifier (SSID) –Required by all clients to include this in every packet –Included as plain text Easy to break Wired Equivalent Privacy (WEP) –Requires that user enter a key manually (to NIC and AP) –Communications encrypted using this key –Short key ( bits) Easy to break by “brute force” Extensible Authentication Protocol (EAP) –WEP keys created dynamically after correct login Requires a login (with password) to a server –After logout, WEP keys discarded by the server Wi-Fi Protected Access (WPA) – new standard –A longer key, changed for every packet
Copyright 2005 John Wiley & Sons, Inc Improving WLAN Performance Similar to improving wired LANs –Improving device performance –Improving wireless circuit capacity –Reducing network demand
Copyright 2005 John Wiley & Sons, Inc Improving WLAN Performance Similar to improving wired LANs –Improving device performance If g widely deployed, replace b cards with.11g cards (may be the cause for slow performance By high-quality cards and APs –Improving wireless circuit capacity Upgrade to g Reexamine placement of APs Check sources of interference (other wireless devices operating in the same frequencies)) Use different type of antennas –Reducing network demand –w
Copyright 2005 John Wiley & Sons, Inc Improving WLAN Device Performance –If g widely deployed, replace b cards with.11g cards May be the cause for slow performance –By high-quality cards and APs Better design Stronger signals, Longer ranges
Copyright 2005 John Wiley & Sons, Inc Improving Wireless Circuit Capacity Upgrade to g Re-place APs –Fewest walls between AP and devices –Ceiling or high mounted to minimize obstacles –On halls, not in closets Remove sources of interference –Other wireless devices operating in the same frequencies Bluetooth devices, cordless phones, etc. Use different type of antennas –Directional antennas in smaller range to get stronger signals (faster throughput)
Copyright 2005 John Wiley & Sons, Inc Reducing WLAN Demand Never place a serve in a WLAN –Doubles the traffic between clients and server Since all communications ii through the AP –Locate the server in the wired part of the network (ideally with a switched LAN) Place wired LAN jacks in commonly used locations –If WLAN becomes a problem, users can switch to wired LAN easily
Copyright 2005 John Wiley & Sons, Inc Implications for Management WLANs becoming common place –Access to internal data, any time, any place Better protection of corporate networks –Public access through WLAN hotspots Competition with cell phone technologies –New cell phone technologies (faster, longer ranges) –Drastic price drops of WLAN devices Widespread Internet access via multiplicity of devices (PDAs, etc,) –Development of new Internet applications New companies created; some old ones out of business –Drastic increase in the amount of data flowing around
Copyright 2005 John Wiley & Sons, Inc Copyright 2005 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in section 117 of the 1976 United States Copyright Act without express permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages caused by the use of these programs or from the use of the information herein.